Governments are also interested in the development of quantum technologies and are working to obtain a leadership role. The European Union, United Kingdom, China,and the United States each have significant efforts underway that focus on quantum information sciences to include quantum computing. One of the areas that the United States has a particular interest in is the impact of quantum computing on national security. In 1994, a mathematician named Peter Shor developed an algorithm, Shor’s algorithm, for integer factorization that could run on a quantum computer. At least some are looking at using recent quantum computing innovations to implement Shor’s algorithm. The algorithm implemented on a quantum computer of sufficient strength could be used to break commonly used cryptography. RSA asymmetric cryptography is one example. It is based on the impracticality of classical computers to factor large integers and is used in many health care, financial, communication, and national security systems to protect secrets and verify data integrity. In August 2015, the US National Security Agency (NSA) provided guidance that asymmetric cryptographic algorithms like RSA and Elliptic Curve Cryptography (ECC) would provide diminished security as quantum computing capabilities advanced. In April 2016, the US National Institute of Standards and Technology (NIST) provided more insight with NISTIR 8105 Report on Post-Quantum Cryptography which includes the following table showing the future impact of quantum computing on common cryptographic algorithms:

On 20 December 2016, NIST announced a Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms. The closing date for proposals was 30 November 2017. It is hoped that this effort will lead to post-quantum cryptographic algorithms and their deployment before a quantum computer is used to compromise data and systems -- especially in health care, financial, communication, and national security environments. This latter concern is twofold. First, post-quantum cryptographic algorithms are needed within the next 10 to 15 years when some believe the breaking of some cryptographic algorithms would be possible by quantum computers. Second, post-quantum cryptographic algorithms are needed to protect the privacy and integrity of information in the near term that may be stored today by a bad actor for later decryption or digital signature compromise once quantum computers are available. Early decryption of today’s secrets (e.g., health care information, banking information and proprietary or sensitive information) or the potential compromise of digital signatures (e.g., digitally signed contracts and digitally signed blockchain/Bitcoin entries) sometime in the future can be problematic.

Quantum computing is a technology in its infancy that once matured can be used to advance innovation in medicine, manufacturing, artificial intelligence and defense. Commercial and academic worlds and governments are racing to obtain leadership in this space. However, quantum computers could also be used to break encryption used to protect secrets and verify data integrity. The US Government is working to develop post-quantum cryptographic algorithms to replace today’s vulnerable cryptographic technologies before their breaking becomes a significant risk.

Ron Sulpizio is an engineer and lawyer with 25 years of information technology experience, specializing in identity and access management, policy writing, cryptography systems, cybersecurity, information sharing, export regulation, privacy and patent prosecution. Ron has been part of the PKH Enterprises team since 2016.